Submit #792636: Totolink A3300R V17.0.0cu.557_B20221024 OS Command Injectioninfo

TitleTotolink A3300R V17.0.0cu.557_B20221024 OS Command Injection
DescriptionIn /cgi-bin/cstecgi.cgi, parameter lcpEchoEnable for topicurl=setWanCfg is included in a backend command flow (Uci_Set_Str -> sprintf -> CsteSystem -> execv) without safe validation. Crafted payloads can break command context and execute attacker-controlled commands.
Source⚠️ https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-lcp-echo-enable-cmd-injection
User
 Svigo_o (UID 95970)
Submission03/30/2026 04:57 (10 days ago)
Moderation04/06/2026 11:43 (7 days later)
StatusDuplicate
VulDB entry250459 [Totolink A3300R 17.0.0cu.557_B20221024 setWanCfg Hostname command injection]
Points0

Interested in the pricing of exploits?

See the underground prices here!